메뉴 건너뛰기




Volumn 60, Issue 11, 2011, Pages 1596-1609

String searching engine for virus scanning

Author keywords

antivirus system; embedded system.; String searching; system security

Indexed keywords

AHO-CORASICK; ANTI VIRUS; ANTI-VIRUS SYSTEMS; HARDWARE CIRCUITS; INPUT STREAMS; LOOK UP TABLE; MEMORY COST; PATTERN SET; STRING-SEARCHING; SYSTEM SECURITY; VIRUS SCANNING;

EID: 80053463355     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2010.250     Document Type: Article
Times cited : (18)

References (27)
  • 1
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • A.V. Aho and M.J. Corasick, "Efficient String Matching: An Aid to Bibliographic Search," Comm. ACM, vol. 18, no. 6, pp. 333-340, 1975.
    • (1975) Comm. ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 3
    • 31144462661 scopus 로고    scopus 로고
    • A computationally efficient engine for flexible intrusion detection
    • DOI 10.1109/TVLSI.2005.859472
    • Z.K. Baker and V.K. Prasanna, "A Computationally Efficient Engine for Flexible Intrusion Detection," IEEE Trans. Very Large Scale Integration (VLSI) Systems, vol. 13, no. 10, pp. 1179-1189, Oct. 2005. (Pubitemid 43131684)
    • (2005) IEEE Transactions on Very Large Scale Integration (VLSI) Systems , vol.13 , Issue.10 , pp. 1179-1189
    • Baker, Z.K.1    Prasanna, V.K.2
  • 4
    • 33751512659 scopus 로고    scopus 로고
    • Automatic synthesis of efficient intrusion detection systems on FPGAs
    • DOI 10.1109/TDSC.2006.44
    • Z.K. Baker and V.K. Prasanna, "Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 289-300, Oct.-Dec. 2006. (Pubitemid 44837032)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 289-300
    • Baker, Z.K.1    Prasanna, V.K.2
  • 7
    • 18644384789 scopus 로고    scopus 로고
    • Efficient reconfigurable logic circuits for matching complex network intrusion detection patterns
    • C.R. Clark and D.E. Schimmel, "Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns," Proc. Int'l Conf. Field-Programmable Logic and Applications, pp. 956-959, 2005.
    • (2005) Proc. Int'l Conf. Field-Programmable Logic and Applications , pp. 956-959
    • Clark, C.R.1    Schimmel, D.E.2
  • 8
    • 1842478680 scopus 로고    scopus 로고
    • Deep packet inspection using parallel bloom filters
    • Jan.-Feb
    • S. Dharmapurikar, P. Krishnamurthy, T.S. Sproull, and J.W. Lockwood, "Deep Packet Inspection Using Parallel Bloom Filters," IEEE Micro, vol. 24, no. 1, pp. 52-61, Jan.-Feb. 2004.
    • (2004) IEEE Micro , vol.24 , Issue.1 , pp. 52-61
    • Dharmapurikar, S.1    Krishnamurthy, P.2    Sproull, T.S.3    Lockwood, J.W.4
  • 9
    • 33749822913 scopus 로고    scopus 로고
    • Fast and scalable pattern matching for network intrusion detection systems
    • Oct
    • S. Dharmapurikar and J. Lockwood, "Fast and Scalable Pattern Matching for Network Intrusion Detection Systems," IEEE J. Selected Areas in Comm., vol. 24, no. 10, pp. 1781-1792, Oct. 2006.
    • (2006) IEEE J. Selected Areas in Comm. , vol.24 , Issue.10 , pp. 1781-1792
    • Dharmapurikar, S.1    Lockwood, J.2
  • 12
    • 63049133823 scopus 로고    scopus 로고
    • PERG: A scalable FPGA-based pattern-matching engine with consolidated bloomier filters
    • Dec
    • J.T.L. Ho and G.F. Lemieux, "PERG: A Scalable FPGA-Based Pattern-Matching Engine with Consolidated Bloomier Filters," Proc. IEEE Int'l Conf. Field-Programmable Technology, pp. 73-80, Dec. 2008.
    • (2008) Proc. IEEE Int'l Conf. Field-Programmable Technology , pp. 73-80
    • Ho, J.T.L.1    Lemieux, G.F.2
  • 13
    • 70349661805 scopus 로고    scopus 로고
    • Variable-stride multi-pattern matching for scalable deep packet inspection
    • N. Hua, H. Song, and T.V. Lakshman, "Variable-Stride Multi-Pattern Matching for Scalable Deep Packet Inspection," Proc. IEEE INFOCOM, pp. 415-423, 2009.
    • (2009) Proc. IEEE INFOCOM , pp. 415-423
    • Hua, N.1    Song, H.2    Lakshman, T.V.3
  • 14
    • 0000904908 scopus 로고
    • Fast pattern matching in strings
    • D. Knuth, J. Morris, and V. Pratt, "Fast Pattern Matching in Strings," SIAM J. Computing, vol. 6, pp. 323-350, 1977.
    • (1977) SIAM J. Computing , vol.6 , pp. 323-350
    • Knuth, D.1    Morris, J.2    Pratt, V.3
  • 16
    • 38549173266 scopus 로고    scopus 로고
    • High-performance pattern-matching for intrusion detection
    • J. van Lunteren, "High-Performance Pattern-Matching for Intrusion Detection," Proc. IEEE INFOCOM, pp. 1-13, 2006.
    • (2006) Proc. IEEE INFOCOM , pp. 1-13
    • Van Lunteren, J.1
  • 17
    • 58749084322 scopus 로고    scopus 로고
    • Pipelined architecture for multi-string matching
    • July-Dec
    • D. Pao, W. Lin, and B. Liu, "Pipelined Architecture for Multi-String Matching," IEEE Computer Architecture Letters, vol. 7, no. 2, pp. 33-36, July-Dec. 2008.
    • (2008) IEEE Computer Architecture Letters , vol.7 , Issue.2 , pp. 33-36
    • Pao, D.1    Lin, W.2    Liu, B.3
  • 18
    • 77958071343 scopus 로고    scopus 로고
    • A memory efficient pipelined implementation of the aho-corasick string matching algorithm
    • D. Pao, W. Lin, and B. Liu, "A Memory Efficient Pipelined Implementation of the Aho-Corasick String Matching Algorithm," ACM Trans. Architecture and Code Optimization, vol. 7, no. 2, pp. 1-27, 2010.
    • (2010) ACM Trans. Architecture and Code Optimization , vol.7 , Issue.2 , pp. 1-27
    • Pao, D.1    Lin, W.2    Liu, B.3
  • 22
    • 51349102260 scopus 로고    scopus 로고
    • A memory efficient multiple pattern matching architecture for network security
    • T. Song, W. Zhang, D. Wang, and Y. Xue, "A Memory Efficient Multiple Pattern Matching Architecture for Network Security," Proc. IEEE INFOCOM, pp. 673-681, 2008.
    • (2008) Proc. IEEE INFOCOM , pp. 673-681
    • Song, T.1    Zhang, W.2    Wang, D.3    Xue, Y.4
  • 25
    • 84991477170 scopus 로고    scopus 로고
    • Bit-split string-matching engines for intrusion detection and prevention
    • L. Tan, B. Brotherton, and T. Sherwood, "Bit-Split String-Matching Engines for Intrusion Detection and Prevention," ACM Trans. Architecture and Code Optimization, vol. 3, no. 1, pp. 3-34, 2006.
    • (2006) ACM Trans. Architecture and Code Optimization , vol.3 , Issue.1 , pp. 3-34
    • Tan, L.1    Brotherton, B.2    Sherwood, T.3
  • 26
    • 8344251916 scopus 로고    scopus 로고
    • Deterministic memory-efficient string matching algorithms for intrusion detection
    • N. Tuck, T. Sherwood, B. Calder, and G. Varghese, "Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection," Proc. IEEE INFOCOM, pp. 2628-2639, 2004.
    • (2004) Proc. IEEE INFOCOM , pp. 2628-2639
    • Tuck, N.1    Sherwood, T.2    Calder, B.3    Varghese, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.